General

  • Target

    2861c16603542d321ef849555bddc786_JaffaCakes118

  • Size

    64KB

  • Sample

    241009-br7gsasdra

  • MD5

    2861c16603542d321ef849555bddc786

  • SHA1

    8257a6fa9b8dcca54d5f5623e4d61b3aedf83a8d

  • SHA256

    b1aa4cbb72ea5eb72797dd60f06f0fa752bcd4ae2769a68621e9491b3f049b84

  • SHA512

    b4a270d5c8bbc8986f79ca0c59a99d95d68622c96ae6ba8d2ac70c4f1da902ca67fbb4ca1d232d938c3eba1d1a7b44f8135f411b13d4317de88c3b160cce2194

  • SSDEEP

    1536:/QQvLCXkmPtQkmulB45htI6JFh3b2qSEH+nmwm:oQzCUZhntbDh

Malware Config

Targets

    • Target

      2861c16603542d321ef849555bddc786_JaffaCakes118

    • Size

      64KB

    • MD5

      2861c16603542d321ef849555bddc786

    • SHA1

      8257a6fa9b8dcca54d5f5623e4d61b3aedf83a8d

    • SHA256

      b1aa4cbb72ea5eb72797dd60f06f0fa752bcd4ae2769a68621e9491b3f049b84

    • SHA512

      b4a270d5c8bbc8986f79ca0c59a99d95d68622c96ae6ba8d2ac70c4f1da902ca67fbb4ca1d232d938c3eba1d1a7b44f8135f411b13d4317de88c3b160cce2194

    • SSDEEP

      1536:/QQvLCXkmPtQkmulB45htI6JFh3b2qSEH+nmwm:oQzCUZhntbDh

    • Boot or Logon Autostart Execution: Print Processors

      Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks